Abstract:
Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first protocol tunnel is established between a security gateway and the femto access point. A second protocol tunnel is then established in either of two ways. In some implementations the second protocol tunnel is established between the access terminal and the security gateway. In other implementations the second protocol tunnel is established between the access terminal and the femto access point, whereby a portion of the tunnel is routed through the first tunnel.
Abstract:
Methods, systems, and devices for wireless communication are described. A plurality of Ethernet devices may transmit Ethernet frames through a cellular network. The Ethernet devices may be coupled to the cellular network via a cellular node. The cellular node may receiver Ethernet frames from the Ethernet devices, identify a traffic class to the Ethernet frames, and map the Ethernet frames to bearers based at least in part on the traffic classes. The cellular node may transmit the Ethernet frames to other cellular nodes using the bearers. At a core network, a mapping between the cellular node and the MAC addresses of the associated Ethernet devices may be stored to allow Ethernet frames to be routed through the cellular network.
Abstract:
A mobile device, such as a smartphone or a tablet computer, can execute functionality for configuring a network device in a communication network and for subsequently controlling the operation of the network device with little manual input. The mobile device can detect sensor information from a network device. The mobile device can determine device configuration information based, at least in part, on decoding the sensor information. The mobile device can provide the device configuration information to an access point of a network. The mobile device can receive communication link information from the access point. The mobile device can provide the communication link information to the network device. The mobile device can receive a message indicating a communication link between the network device and the access point is established.
Abstract:
This disclosure provides systems, methods and apparatus, including computer programs encoded on computer storage media for mitigating an Internet of things (IoT) worm. In one aspect, a processor of a router device may randomly select a plurality of Internet Protocol (IP) addresses. The processor may expose one or more emulated services at the plurality of randomly selected IP addresses. The processor may determine whether IoT worm communication activity is detected at one of the randomly selected IP addresses. The processor may grant to, or otherwise enable, an IoT worm access to one of the emulated services in response to detecting IoT worm communication activity at one of the selected IP addresses.
Abstract:
A method, device, and system for managing wireless communications between a transmitting device and a receiving device including adjusting a size of a frame to be transmitted in response to determining that a potential degradation in reception of information within the frame to be transmitted due to relative motions of the transmitting device and the receiving device is likely to cause packet error rates of sub-frames within the frame to be transmitted to exceed a first packet error rate threshold value.
Abstract:
Methods and system for detecting anomalous behavior in a home network is performed by an access point. The access point passively monitors, within the home network, network traffic corresponding to each of a number of devices associated with it, without an approval from any of the number of devices. In another aspect, the access point passively monitors, within the home network, individual traffic flows between the access point and the number of devices associated with it. The access point then compares, for each of the devices, one or more characteristics of the corresponding network traffic or the individual traffic flows with a baseline model of network behavior and identifies which of the number of devices is associated with anomalous behavior based on the comparison.
Abstract:
An apparatus and method for configuring a wireless station for use within a wireless local area network are disclosed. In at least one exemplary embodiment, a pairwise master key is generated by the wireless station and an access point within the wireless local area network. The pairwise master key may be based, at least in part, on a transient identity key pair of the wireless station. The transient identity key pair may be generated by the wireless station in response to receiving a message from the access point. In some embodiments, a public transient identity key of the transient identity key pair may be provided to additional access points to enable the wireless station to authenticate with the additional access points.
Abstract:
With multiple communication channels available and range extenders, a number of paths may be available for communicating traffic in a wireless network. Traffic on paths in the wireless network may be load balanced to improve channel utilization and/or relieve an overloaded communication channel. To load balance the traffic, a first AP may determine candidate paths between a first AP and a client device, wherein at least one of the candidate paths traverses a second AP. The AP may determine available bandwidths of the candidate paths based, at least in part, on availability of communication channels of the candidate paths. The AP may steer a portion of the wireless network traffic of the client device to a first of the candidate paths based, at least in part, on the available bandwidths.
Abstract:
A first AP in a wireless network determines that a wireless client device should re-associate from the first AP to a second AP of the wireless network. The first AP communicates an AP coordination message from the first AP to the second AP to share coordination information with the second AP. The first AP coordinates with the second AP to cause the re-association of the wireless client device in accordance with the coordination information. The first and second AP may coordinate directly to synchronize re-association activities. Re-association activities may include the use of a configuration message to the wireless client device, managing transmit power of beacon messages from the first and second APs, or forced disassociation and blocking. The first AP may maintain a record of which re-association activity was successful in causing the wireless client device to re-associate to the second AP.
Abstract:
Described in this disclosure are embodiments for controlling a load and an energy source associated with an entity. A system may determine a first energy level, along with variability for the first energy level, associated with the entity for a first period (e.g., prior to a present time). The system may further determine a contextual data, along with variability for the contextual data, associated with the entity for a second period (e.g., after the present time). The first and second energy levels may be received from one or more control devices in communication with the system. The system may determine a second energy level associated with the entity for the second period. The second energy level may be based at least partly on the first energy level and the contextual data. The system may control, based at least partly on the second energy level, the load and the energy source.